Home CVE Database CVE-2016-8632

CVE-2016-8632

Description

The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.

Priority: HIGH
CVSS v3: 7.8
Publish Date: Nov 27, 2016
Related ID: --
CVSS v2: High
Modified Date: Nov 28, 2016

Find out more about CVE-2016-8632 from the MITRE-CVE dictionary and NIST NVD


Products Affected

Login may be required to access defects or downloads.

Product Name Status Defect Fixed Downloads
Linux
Wind River Linux LTS 17 Not Vulnerable -- -- --
Wind River Linux 8 Fixed LIN8-5386
8.0.0.14 --
Wind River Linux 9 Fixed LIN9-2798
9.0.0.2 --
Wind River Linux 7 Fixed -- 7.0.0.23 --
Wind River Linux LTS 18 Not Vulnerable -- -- --
Wind River Linux LTS 19 Not Vulnerable -- -- --
Wind River Linux CD release Not Vulnerable -- -- --
VxWorks
VxWorks 7 Not Vulnerable -- -- --
VxWorks 6.9 Not Vulnerable -- -- --

Related Products

Product Name Status Defect Fixed Downloads

Comments

linux

Live chat
Online